The cabd_extract function in cabd.c in libmspack before 0.5 does not properly maintain decompression callbacks in certain cases where an invalid file follows a valid file, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted CAB archive.
Link | Tags |
---|---|
http://openwall.com/lists/oss-security/2015/02/03/11 | mailing list |
https://bugs.debian.org/774665 | exploit |
http://www.securityfocus.com/bid/72474 | vdb entry |